Description
Using Hibernate to execute a dynamic SQL statement with
built-in user-controlled input can allow an attacker to modify the
statement's meaning or to execute arbitrary SQL commands.
Metadata
- Base program: Apache Jena
- Source Taint: SOCKET
- Data Type: ARRAY
- Data Flow: ADDRESS_AS_FUNCTION_RETURN_VALUE
- Control Flow: INFINITE_LOOP
Flaws
Test Suites
Documentation
Have any comments on this test case? Please, send us an email.